VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202507-2957 CVE-2025-51383 D-Link Systems, Inc.  of  di-8200  Stack-based buffer overflow vulnerability in firmware CVSS V2: 2.7
CVSS V3: 3.5
Severity: LOW
D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_road_asp function via the host_ip parameter. D-Link Systems, Inc. of di-8200 A stack-based buffer overflow vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state. The D-Link DI_8200 is a D-Link router designed for small and medium-sized network environments. It supports multi-channel bandwidth aggregation, PPPoE authentication and billing, and intelligent flow control. This vulnerability stems from the ipsec_road_asp function failing to properly validate the length of input data. An attacker could exploit this vulnerability to cause a denial of service
VAR-202507-2948 CVE-2012-10021 D-Link Technology DIR-605L Buffer Overflow Vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: Critical
A stack-based buffer overflow vulnerability exists in D-Link DIR-605L Wireless N300 Cloud Router firmware versions 1.12 and 1.13 via the getAuthCode() function. The flaw arises from unsafe usage of sprintf() when processing user-supplied CAPTCHA data via the FILECODE parameter in /goform/formLogin. A remote unauthenticated attacker can exploit this to execute arbitrary code with root privileges on the device. The D-Link DIR-605L is D-Link's first cloud router, designed for home and small office networks
VAR-202507-3352 No CVE Dell (China) Co., Ltd. Dell 2350dn has an unauthorized access vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Dell 2350dn is a monochrome laser printer. A vulnerability exists in the Dell 2350dn printer from Dell (China) Co., Ltd. that could allow an attacker to obtain sensitive information.
VAR-202507-3675 No CVE Honeywell (China) Co., Ltd. Honeywell PD43 has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Honeywell PD43 is an industrial-grade label printer. The Honeywell PD43, manufactured by Honeywell (China) Co., Ltd., has a weak password vulnerability that could allow attackers to obtain sensitive information.
VAR-202507-3351 No CVE D-Link DI-500WF from D-Link Electronics (Shanghai) Co., Ltd. has a binary vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
The D-Link DI-500WF is a panel-mounted wireless access point. The D-Link DI-500WF, manufactured by D-Link Electronics (Shanghai) Co., Ltd., contains a binary vulnerability that could allow an attacker to execute arbitrary commands.
VAR-202507-3674 No CVE Shenzhen Bilian Electronics Co., Ltd. BL-AC2100 has a binary vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
The BL-AC2100 is a Wi-Fi 6 wireless router. Shenzhen Bilian Electronics Co., Ltd.'s BL-AC2100 has a binary vulnerability that could allow an attacker to gain server privileges.
VAR-202507-3110 CVE-2025-52490 Couchbase, Inc.  of  Sync Gateway  Vulnerability in plaintext transmission of important information in CVSS V2: -
CVSS V3: 7.3
Severity: HIGH
An issue was discovered in Couchbase Sync Gateway before 3.2.6. In sgcollect_info_options.log and sync_gateway.log, there are cleartext passwords in redacted and unredacted output. Couchbase, Inc. of Sync Gateway Contains a vulnerability in the transmission of important information in clear text.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202507-2930 CVE-2025-53715 TP-LINK Technologies  of  TL-WR841N  Buffer error vulnerability in firmware CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
A vulnerability has been found in TP-Link TL-WR841N V11. The vulnerability exists in the /userRpm/Wan6to4TunnelCfgRpm.htm file due to missing input parameter validation, which may lead to the buffer overflow to cause a crash of the web service and result in a denial-of-service (DoS) condition. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer. TP-LINK Technologies of TL-WR841N A buffer error vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state
VAR-202507-2986 CVE-2025-53714 TP-LINK Technologies  of  TL-WR841N  Buffer error vulnerability in firmware CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
A vulnerability has been found in TP-Link TL-WR841N V11. The vulnerability exists in the /userRpm/WzdWlanSiteSurveyRpm_AP.htm file due to missing input parameter validation, which may lead to the buffer overflow to cause a crash of the web service and result in a denial-of-service (DoS) condition. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer. TP-LINK Technologies of TL-WR841N A buffer error vulnerability exists in the firmware.Service operation interruption (DoS) It may be in a state
VAR-202507-2897 CVE-2025-53713 TP-LINK Technologies  of  TL-WR841N  Buffer error vulnerability in firmware CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
A vulnerability has been found in TP-Link TL-WR841N V11. The vulnerability exists in the /userRpm/WlanNetworkRpm_APC.htm file due to missing input parameter validation, which may lead to the buffer overflow to cause a crash of the web service and result in a denial-of-service (DoS) condition. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer. TP-LINK Technologies of TL-WR841N The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202507-2973 CVE-2025-53712 TP-LINK Technologies  of  TL-WR841N  Buffer error vulnerability in firmware CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
A vulnerability has been found in TP-Link TL-WR841N V11. The vulnerability exists in the /userRpm/WlanNetworkRpm_AP.htm file due to missing input parameter validation, which may lead to the buffer overflow to cause a crash of the web service and result in a denial-of-service (DoS) condition.  The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer. TP-LINK Technologies of TL-WR841N The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202507-2939 CVE-2025-53711 TP-LINK Technologies  of  TL-WR841N  Buffer error vulnerability in firmware CVSS V2: -
CVSS V3: 7.5
Severity: HIGH
A vulnerability has been found in TP-Link TL-WR841N V11. The vulnerability exists in the /userRpm/WlanNetworkRpm.htm file due to missing input parameter validation, which may lead to the buffer overflow to cause a crash of the web service and result in a denial-of-service (DoS) condition. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer. TP-LINK Technologies of TL-WR841N The firmware contains a buffer error vulnerability and a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202507-3065 CVE-2025-52284 TOTOLINK  of  x6000r  Command injection vulnerability in firmware CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
Totolink X6000R V9.4.0cu.1360_B20241207 was found to contain a command injection vulnerability in the sub_4184C0 function via the tz parameter. This vulnerability allows unauthenticated attackers to execute arbitrary commands via a crafted request. TOTOLINK of x6000r Firmware contains a command injection vulnerability.Information may be obtained and information may be tampered with. The TOTOLINK X6000R, a wireless router released by China's TOTOLINK Electronics, supports WiFi 6 technology, offering high concurrent connections and dual-band transmission capabilities. Detailed vulnerability details are currently unavailable
VAR-202507-3601 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd.'s Tenda HG10 has a command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Shenzhen Jixiang Tengda Technology Co., Ltd. (Tenda) is a high-tech enterprise specializing in the research and development, production, sales, and service of network communication equipment. Shenzhen Jixiang Tengda Technology Co., Ltd.'s Tenda HG10 has a command execution vulnerability that could allow an attacker to execute arbitrary commands.
VAR-202507-3600 No CVE Sharp Technology (Shanghai) Co., Ltd.'s SHARP-MX series has an information disclosure vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Sharp Technology (Shanghai) Co., Ltd. is a world-renowned developer and manufacturer of comprehensive electronic products. Sharp Technology (Shanghai) Co., Ltd.'s SHARP-MX series products contain an information leakage vulnerability that could allow attackers to obtain sensitive information.
VAR-202507-3676 No CVE Vicon Industries IQinVision has a weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Vicon Industries specializes in the development and production of security and surveillance solutions. A weak password vulnerability exists in Vicon Industries' IQinVision software, allowing attackers to obtain sensitive information.
VAR-202507-3915 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd.'s Tenda HG10 has a denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Shenzhen Jixiang Tengda Technology Co., Ltd. (Tenda) is a high-tech enterprise specializing in the research and development, production, sales, and service of network communication equipment. A denial of service vulnerability exists in the Tenda HG10, a device manufactured by Shenzhen Jixiang Tengda Technology Co., Ltd., that could be exploited by an attacker to cause a denial of service.
VAR-202507-3839 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd. HG7, HG9, HG10 and HG10C have a command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Shenzhen Jixiang Tengda Technology Co., Ltd. (Tenda) is a high-tech enterprise specializing in the research and development, production, sales, and service of network communication equipment. Shenzhen Jixiang Tenda Technology Co., Ltd.'s HG7, HG9, HG10, and HG10C devices contain a command execution vulnerability that could allow an attacker to execute arbitrary commands.
VAR-202507-3602 No CVE Shenzhen Jixiang Tengda Technology Co., Ltd.'s Tenda HG10 has a command execution vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Shenzhen Jixiang Tengda Technology Co., Ltd. (Tenda) is a high-tech enterprise specializing in the research and development, production, sales, and service of network communication equipment. Shenzhen Jixiang Tengda Technology Co., Ltd.'s Tenda HG10 has a command execution vulnerability that could allow an attacker to execute arbitrary commands.
VAR-202507-3838 No CVE D-Link DI-500WF from D-Link Electronics (Shanghai) Co., Ltd. has a command execution vulnerability CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
The D-Link DI-500WF is a panel-mounted wireless access point. The D-Link DI-500WF, manufactured by D-Link Electronics (Shanghai) Co., Ltd., has a command execution vulnerability that could allow an attacker to execute arbitrary commands.